Matches in SemOpenAlex for { <https://semopenalex.org/work/W1564243574> ?p ?o ?g. }
- W1564243574 abstract "Today, our dependence on the internet has grown manifold. So has the need to protect our vast personal information accessible via web interfaces such as online passwords, corporate secrets, online banking accounts, and social networking accounts like Facebook. The appearance of botnets in the internet scene over the last decade, and their ever changing behavior has caused real challenges that cannot be easily remedied. According to literature, a botnet is defined to be a set of infected hosts (also called bots or zombies) that run autonomously and automatically, controlled by a botmaster (bot herder) who can co-ordinate his/her malicious intentions using the infected bots. Some of the prominent malicious tasks that can be credited to botnets include DDoS (Distributed denialof-service), spam, phishing, ransomwares and identity theft. In a botnet DDoS attack, the botmaster can command all its bots to attack a particular server (example: update.microsoft.com) at a particular date, time and for a duration via a malicious or anonymous proxy used as a stepping-stone to hide the actual commanding node. In a spam campaign, the nodes that form the bot network are responsible for sending spam by behaving as spam relay points, delivering spam mails to a list of intended victim email addresses selected by the botmaster. For example: a node which is part of a spam botnet could be sent a list of email addresses to spam for the day with a payload of the spam that is to be mailed. These spam messages could advertise pharmaceutical products and may also deliver further infection executables via email links or attachments to recruit more bots, as done by botnets such as Storm and Waledac. In a phishing scam, botnets are responsible for acting as web proxies or web servers to deliver hoax site content to benign users to gather their e-banking or credit card credentials. For example, the sites could host content which looks like a banking site requesting for login details credentials which when entered by the user, can be used by the botmaster to access legitimate banking sites. Eventually the funds are transferred to accounts that leave no trails (Nazario & Holz, 2008). Botnets such as Storm have been known to infect over 2 million hosts while Conficker has infected over 9 million hosts according to some estimates. As can be seen, the far reaching effects of malicious intentions of botnets and their masters are a real threat. This chapter will cover a concise survey of botnet detection systems as well as provide a novel mobile-agent based method that has been adapted from mobile-agent based intrusion detection systems, for handling botnets. We provide the necessary background needed to understand botnets such as the offensive techniques utilized by botnets; the defensive" @default.
- W1564243574 created "2016-06-24" @default.
- W1564243574 creator A5001889625 @default.
- W1564243574 creator A5042258629 @default.
- W1564243574 date "2011-03-22" @default.
- W1564243574 modified "2023-10-01" @default.
- W1564243574 title "Advanced Methods for Botnet Intrusion Detection Systems" @default.
- W1564243574 cites W10242621 @default.
- W1564243574 cites W121033682 @default.
- W1564243574 cites W123401891 @default.
- W1564243574 cites W1491237615 @default.
- W1564243574 cites W1499648394 @default.
- W1564243574 cites W1506939014 @default.
- W1564243574 cites W1513323201 @default.
- W1564243574 cites W1527646163 @default.
- W1564243574 cites W1550514379 @default.
- W1564243574 cites W1551705282 @default.
- W1564243574 cites W1581009051 @default.
- W1564243574 cites W1583098994 @default.
- W1564243574 cites W1597718388 @default.
- W1564243574 cites W1598022263 @default.
- W1564243574 cites W1634470931 @default.
- W1564243574 cites W164610907 @default.
- W1564243574 cites W1655456 @default.
- W1564243574 cites W1674877186 @default.
- W1564243574 cites W1775772884 @default.
- W1564243574 cites W1801784469 @default.
- W1564243574 cites W1850370072 @default.
- W1564243574 cites W1873122431 @default.
- W1564243574 cites W187875600 @default.
- W1564243574 cites W1909494783 @default.
- W1564243574 cites W191098608 @default.
- W1564243574 cites W193578806 @default.
- W1564243574 cites W1947148487 @default.
- W1564243574 cites W1962340579 @default.
- W1564243574 cites W2000773362 @default.
- W1564243574 cites W200926709 @default.
- W1564243574 cites W2090942719 @default.
- W1564243574 cites W2095610745 @default.
- W1564243574 cites W2097602077 @default.
- W1564243574 cites W2100903665 @default.
- W1564243574 cites W2102671922 @default.
- W1564243574 cites W2105272313 @default.
- W1564243574 cites W2106529232 @default.
- W1564243574 cites W2107135371 @default.
- W1564243574 cites W2110500171 @default.
- W1564243574 cites W2111165162 @default.
- W1564243574 cites W2112063328 @default.
- W1564243574 cites W2114092087 @default.
- W1564243574 cites W2117520528 @default.
- W1564243574 cites W2122169931 @default.
- W1564243574 cites W2128031609 @default.
- W1564243574 cites W2131154421 @default.
- W1564243574 cites W2133301884 @default.
- W1564243574 cites W2137786570 @default.
- W1564243574 cites W2138644293 @default.
- W1564243574 cites W2142717373 @default.
- W1564243574 cites W2147423818 @default.
- W1564243574 cites W2147767253 @default.
- W1564243574 cites W2149701633 @default.
- W1564243574 cites W2151135920 @default.
- W1564243574 cites W2152449272 @default.
- W1564243574 cites W2157153057 @default.
- W1564243574 cites W2161022104 @default.
- W1564243574 cites W2165597437 @default.
- W1564243574 cites W2173803529 @default.
- W1564243574 cites W23711711 @default.
- W1564243574 cites W33043110 @default.
- W1564243574 cites W33961663 @default.
- W1564243574 cites W53369608 @default.
- W1564243574 cites W601143601 @default.
- W1564243574 cites W1570687565 @default.
- W1564243574 cites W205175404 @default.
- W1564243574 doi "https://doi.org/10.5772/15401" @default.
- W1564243574 hasPublicationYear "2011" @default.
- W1564243574 type Work @default.
- W1564243574 sameAs 1564243574 @default.
- W1564243574 citedByCount "2" @default.
- W1564243574 countsByYear W15642435742016 @default.
- W1564243574 countsByYear W15642435742021 @default.
- W1564243574 crossrefType "book-chapter" @default.
- W1564243574 hasAuthorship W1564243574A5001889625 @default.
- W1564243574 hasAuthorship W1564243574A5042258629 @default.
- W1564243574 hasBestOaLocation W15642435741 @default.
- W1564243574 hasConcept C110875604 @default.
- W1564243574 hasConcept C127313418 @default.
- W1564243574 hasConcept C136764020 @default.
- W1564243574 hasConcept C158251709 @default.
- W1564243574 hasConcept C17409809 @default.
- W1564243574 hasConcept C22735295 @default.
- W1564243574 hasConcept C35525427 @default.
- W1564243574 hasConcept C38652104 @default.
- W1564243574 hasConcept C41008148 @default.
- W1564243574 hasConceptScore W1564243574C110875604 @default.
- W1564243574 hasConceptScore W1564243574C127313418 @default.
- W1564243574 hasConceptScore W1564243574C136764020 @default.
- W1564243574 hasConceptScore W1564243574C158251709 @default.
- W1564243574 hasConceptScore W1564243574C17409809 @default.
- W1564243574 hasConceptScore W1564243574C22735295 @default.
- W1564243574 hasConceptScore W1564243574C35525427 @default.